Back propagation learning routine, Computer Engineering

Back propagation Learning Routine - Aartificial intelligence

As with perceptrons, the information in the network is stored in the weights, so the learning problem comes down to the question: how do we train the weights to best categories the training instance. Then we hope that this representation provides a nice way to categories unseen examples.

In outline, the back propagation method is the similar as for perceptrons:

1. We select and fix our architecture for the network, which will include input, hidden and output units, all of which will include sigmoid functions.

2. We randomly assign the weights between all the nodes. The assignments would be to smaller numbers, typically between -0.5 and 0.5.

3. Each training instance is used, 1 after another, to re-train the weights in the network. The way this is done is given in detail below.

4.   After each epoch (run through all the training examples), a termination situation is examine (also detailed below). For this method, Note down that, we are not guaranteed to search weights which give the network the global minimum error, for example, absolutely right categorization of the training examples. Hence the termination condition can have to be in terms of a (possibly small) number of miscategorisations. We see later that this must not be such a fine idea, though.

 

Posted Date: 10/2/2012 6:22:46 AM | Location : United States







Related Discussions:- Back propagation learning routine, Assignment Help, Ask Question on Back propagation learning routine, Get Answer, Expert's Help, Back propagation learning routine Discussions

Write discussion on Back propagation learning routine
Your posts are moderated
Related Questions
One way of demonstrating the importance of good ID is by showing tangible benefits that can be talked about in cash terms. Within a business, good ID can lead to benefits such as h

Question: (a) Identify the four main enhancements brought along by TKIP on WPA to solve the problems in WEP. (b) The term WarDriving has been frequently used while talking

Determine reduced Boolean equation and the Karnaugh Map? Illustration : Determine reduced Boolean equation and the Karnaugh Map for the truth table shown below:

(i)  A multiplexer combines four 100-Kbps channels using a time slot of 4 bits. Each Frame has the size of 16 bits. a)  Show the output with the four inputs as shown in the figu

The Storage Class register The Storage Class register : The storage class 'register' tells the compiler that the associated variable  should  be stored  in  high-speed  memor

What is the system call available to change the personality? The system call personality prefers to a method to modify its implementation domain in order that Linux can emulate

SPMD is actually a "high level" programming model that can be built upon any combination of the previously mentioned parallel programming models. A single program is executed by al

What is  Functional Modelling  We know that Data flow modelling is an ordinary technique used for analysis of a problem in software engineering. It is very useful for analyzi

Determine the types of software There are two types of software today: Application and systems. Meaning of the two changes computer to computer. As we concentrate on large c

show hosts is the command which display the IP host table